Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2013-0759

Опубликовано: 13 янв. 2013
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 5

Описание

Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 allow remote attackers to spoof the address bar via vectors involving authentication information in the userinfo field of a URL, in conjunction with a 204 (aka No Content) HTTP status code.

РелизСтатусПримечание
devel

released

19.0~b1+build2-0ubuntu1
hardy

ignored

end of life
lucid

released

18.0+build1-0ubuntu0.10.04.3
oneiric

released

18.0+build1-0ubuntu0.11.10.3
precise

released

18.0+build1-0ubuntu0.12.04.3
quantal

released

18.0+build1-0ubuntu0.12.10.3
raring

released

19.0~b1+build2-0ubuntu1
saucy

released

19.0~b1+build2-0ubuntu1
upstream

released

18.0

Показывать по

РелизСтатусПримечание
devel

DNE

hardy

ignored

end of life
lucid

ignored

end of life
oneiric

ignored

end of life
precise

DNE

quantal

DNE

raring

DNE

saucy

DNE

upstream

released

2.15

Показывать по

РелизСтатусПримечание
devel

released

17.0.2+build1-0ubuntu1
hardy

ignored

end of life
lucid

released

17.0.2+build1-0ubuntu0.10.04.1
oneiric

released

17.0.2+build1-0ubuntu0.11.10.1
precise

released

17.0.2+build1-0ubuntu0.12.04.1
quantal

released

17.0.2+build1-0ubuntu0.12.10.1
raring

released

17.0.2+build1-0ubuntu1
saucy

released

17.0.2+build1-0ubuntu1
upstream

released

17.0.2

Показывать по

EPSS

Процентиль: 79%
0.01368
Низкий

5 Medium

CVSS2

Связанные уязвимости

redhat
больше 12 лет назад

Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 allow remote attackers to spoof the address bar via vectors involving authentication information in the userinfo field of a URL, in conjunction with a 204 (aka No Content) HTTP status code.

nvd
больше 12 лет назад

Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 allow remote attackers to spoof the address bar via vectors involving authentication information in the userinfo field of a URL, in conjunction with a 204 (aka No Content) HTTP status code.

debian
больше 12 лет назад

Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x ...

github
больше 3 лет назад

Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 allow remote attackers to spoof the address bar via vectors involving authentication information in the userinfo field of a URL, in conjunction with a 204 (aka No Content) HTTP status code.

oracle-oval
больше 12 лет назад

ELSA-2013-0145: thunderbird security update (CRITICAL)

EPSS

Процентиль: 79%
0.01368
Низкий

5 Medium

CVSS2

Уязвимость CVE-2013-0759